Bug 37240 - squid3: Denial of service (ES 3.1)
squid3: Denial of service (ES 3.1)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P3 normal (vote)
: UCS 3.1-ES
Assigned To: Stefan Gohmann
Janek Walkenhorst
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-12-08 15:43 CET by Moritz Muehlenhoff
Modified: 2015-09-03 12:58 CEST (History)
2 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments
3.1-squid3.txt (986 bytes, text/plain)
2015-09-01 08:13 CEST, Stefan Gohmann
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-12-08 15:43:29 CET
Denial of service through malformed Range: headers (CVE-2014-3609)
http://www.squid-cache.org/Advisories/SQUID-2014_2.txt
Comment 1 Stefan Gohmann univentionstaff 2015-09-01 08:13:11 CEST
3.1.6-1.2+squeeze5 has been imported and built. I've copied the enable ssl patch: r15201. 3.1.6-1.2+squeeze5 also fixes this issue:
CVE-2015-5400: Do not blindly forward cache peer CONNECT responses.

The version number should be between UCS 3.1 and UCS 3.2.

Since in UCS 3.0/3.1 is 3.1.6-1.2+squeeze2, it also fixes CVE-2012-5643 and CVE-2013-0189.
Comment 2 Stefan Gohmann univentionstaff 2015-09-01 08:13:35 CEST
Created attachment 7146 [details]
3.1-squid3.txt
Comment 3 Janek Walkenhorst univentionstaff 2015-09-02 16:45:55 CEST
Patch: OK
Changelog: OK
Advisory: OK
Tests (i386, amd64): OK
Comment 4 Janek Walkenhorst univentionstaff 2015-09-03 12:58:31 CEST
Published